Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
13-06-2024 08:10
Static task
static1
Behavioral task
behavioral1
Sample
a48fb452c125ea909d438509460bfcae_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
a48fb452c125ea909d438509460bfcae_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
a48fb452c125ea909d438509460bfcae_JaffaCakes118.html
-
Size
26KB
-
MD5
a48fb452c125ea909d438509460bfcae
-
SHA1
4a852744466919c9a527e548f26d5a20d1b374e9
-
SHA256
c52ac0fd615dc268703a038057b4778b43da49166bc4134ac687238ee2f32e53
-
SHA512
083d113c8765f1214c8b3fe26a2a0eec259d9b3376825bd67b6c643b6a3f5529f7fbe7fccd5384e0dc879ec5051c3c433e620a8380dc789372d26ce444c01052
-
SSDEEP
768:iZyW/FyJSOcX027Bf+PmoIlqdIr/TwWeTPhcO1lSFjeG6:iZyW/FyJSOcX0NIlz/TwWeTPhcO1lSF2
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 5112 msedge.exe 5112 msedge.exe 184 msedge.exe 184 msedge.exe 516 identity_helper.exe 516 identity_helper.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 184 msedge.exe 184 msedge.exe 184 msedge.exe 184 msedge.exe 184 msedge.exe 184 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 184 msedge.exe 184 msedge.exe 184 msedge.exe 184 msedge.exe 184 msedge.exe 184 msedge.exe 184 msedge.exe 184 msedge.exe 184 msedge.exe 184 msedge.exe 184 msedge.exe 184 msedge.exe 184 msedge.exe 184 msedge.exe 184 msedge.exe 184 msedge.exe 184 msedge.exe 184 msedge.exe 184 msedge.exe 184 msedge.exe 184 msedge.exe 184 msedge.exe 184 msedge.exe 184 msedge.exe 184 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 184 msedge.exe 184 msedge.exe 184 msedge.exe 184 msedge.exe 184 msedge.exe 184 msedge.exe 184 msedge.exe 184 msedge.exe 184 msedge.exe 184 msedge.exe 184 msedge.exe 184 msedge.exe 184 msedge.exe 184 msedge.exe 184 msedge.exe 184 msedge.exe 184 msedge.exe 184 msedge.exe 184 msedge.exe 184 msedge.exe 184 msedge.exe 184 msedge.exe 184 msedge.exe 184 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 184 wrote to memory of 3672 184 msedge.exe 83 PID 184 wrote to memory of 3672 184 msedge.exe 83 PID 184 wrote to memory of 4832 184 msedge.exe 84 PID 184 wrote to memory of 4832 184 msedge.exe 84 PID 184 wrote to memory of 4832 184 msedge.exe 84 PID 184 wrote to memory of 4832 184 msedge.exe 84 PID 184 wrote to memory of 4832 184 msedge.exe 84 PID 184 wrote to memory of 4832 184 msedge.exe 84 PID 184 wrote to memory of 4832 184 msedge.exe 84 PID 184 wrote to memory of 4832 184 msedge.exe 84 PID 184 wrote to memory of 4832 184 msedge.exe 84 PID 184 wrote to memory of 4832 184 msedge.exe 84 PID 184 wrote to memory of 4832 184 msedge.exe 84 PID 184 wrote to memory of 4832 184 msedge.exe 84 PID 184 wrote to memory of 4832 184 msedge.exe 84 PID 184 wrote to memory of 4832 184 msedge.exe 84 PID 184 wrote to memory of 4832 184 msedge.exe 84 PID 184 wrote to memory of 4832 184 msedge.exe 84 PID 184 wrote to memory of 4832 184 msedge.exe 84 PID 184 wrote to memory of 4832 184 msedge.exe 84 PID 184 wrote to memory of 4832 184 msedge.exe 84 PID 184 wrote to memory of 4832 184 msedge.exe 84 PID 184 wrote to memory of 4832 184 msedge.exe 84 PID 184 wrote to memory of 4832 184 msedge.exe 84 PID 184 wrote to memory of 4832 184 msedge.exe 84 PID 184 wrote to memory of 4832 184 msedge.exe 84 PID 184 wrote to memory of 4832 184 msedge.exe 84 PID 184 wrote to memory of 4832 184 msedge.exe 84 PID 184 wrote to memory of 4832 184 msedge.exe 84 PID 184 wrote to memory of 4832 184 msedge.exe 84 PID 184 wrote to memory of 4832 184 msedge.exe 84 PID 184 wrote to memory of 4832 184 msedge.exe 84 PID 184 wrote to memory of 4832 184 msedge.exe 84 PID 184 wrote to memory of 4832 184 msedge.exe 84 PID 184 wrote to memory of 4832 184 msedge.exe 84 PID 184 wrote to memory of 4832 184 msedge.exe 84 PID 184 wrote to memory of 4832 184 msedge.exe 84 PID 184 wrote to memory of 4832 184 msedge.exe 84 PID 184 wrote to memory of 4832 184 msedge.exe 84 PID 184 wrote to memory of 4832 184 msedge.exe 84 PID 184 wrote to memory of 4832 184 msedge.exe 84 PID 184 wrote to memory of 4832 184 msedge.exe 84 PID 184 wrote to memory of 5112 184 msedge.exe 85 PID 184 wrote to memory of 5112 184 msedge.exe 85 PID 184 wrote to memory of 2504 184 msedge.exe 86 PID 184 wrote to memory of 2504 184 msedge.exe 86 PID 184 wrote to memory of 2504 184 msedge.exe 86 PID 184 wrote to memory of 2504 184 msedge.exe 86 PID 184 wrote to memory of 2504 184 msedge.exe 86 PID 184 wrote to memory of 2504 184 msedge.exe 86 PID 184 wrote to memory of 2504 184 msedge.exe 86 PID 184 wrote to memory of 2504 184 msedge.exe 86 PID 184 wrote to memory of 2504 184 msedge.exe 86 PID 184 wrote to memory of 2504 184 msedge.exe 86 PID 184 wrote to memory of 2504 184 msedge.exe 86 PID 184 wrote to memory of 2504 184 msedge.exe 86 PID 184 wrote to memory of 2504 184 msedge.exe 86 PID 184 wrote to memory of 2504 184 msedge.exe 86 PID 184 wrote to memory of 2504 184 msedge.exe 86 PID 184 wrote to memory of 2504 184 msedge.exe 86 PID 184 wrote to memory of 2504 184 msedge.exe 86 PID 184 wrote to memory of 2504 184 msedge.exe 86 PID 184 wrote to memory of 2504 184 msedge.exe 86 PID 184 wrote to memory of 2504 184 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\a48fb452c125ea909d438509460bfcae_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:184 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff8c9246f8,0x7fff8c924708,0x7fff8c9247182⤵PID:3672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1464,18072511106927175930,15697716762508467443,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2280 /prefetch:22⤵PID:4832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1464,18072511106927175930,15697716762508467443,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2324 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1464,18072511106927175930,15697716762508467443,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2612 /prefetch:82⤵PID:2504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1464,18072511106927175930,15697716762508467443,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:1520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1464,18072511106927175930,15697716762508467443,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:3956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1464,18072511106927175930,15697716762508467443,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5408 /prefetch:82⤵PID:4160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1464,18072511106927175930,15697716762508467443,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5408 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1464,18072511106927175930,15697716762508467443,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4956 /prefetch:12⤵PID:4692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1464,18072511106927175930,15697716762508467443,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4720 /prefetch:12⤵PID:4656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1464,18072511106927175930,15697716762508467443,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5524 /prefetch:12⤵PID:4688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1464,18072511106927175930,15697716762508467443,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5548 /prefetch:12⤵PID:5092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1464,18072511106927175930,15697716762508467443,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4800 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5008
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5068
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:628
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5c5abc082d9d9307e797b7e89a2f755f4
SHA154c442690a8727f1d3453b6452198d3ec4ec13df
SHA256a055d69c6aba59e97e632d118b7960a5fdfbe35cfdfaa0de14f194fc6f874716
SHA512ad765cddbf89472988de5356db5e0ee254ca3475491c6034fba1897c373702ab7cfa4bd21662ab862eebb48a757c3eb86b1f8ed58629751f71863822a59cd26c
-
Filesize
152B
MD5b4a74bc775caf3de7fc9cde3c30ce482
SHA1c6ed3161390e5493f71182a6cb98d51c9063775d
SHA256dfad4e020a946f85523604816a0a9781091ee4669c870db2cabab027f8b6f280
SHA51255578e254444a645f455ea38480c9e02599ebf9522c32aca50ff37aad33976db30e663d35ebe31ff0ecafb4007362261716f756b3a0d67ac3937ca62ff10e25f
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
444B
MD5108176ff3dd6d828045b5918f4fdee81
SHA14e0c79c06f93d701e7e066e487d33e32cf750530
SHA2560f61abb964dacd8198bb58911013ed279bf40951d9f5317516213e9d7525ccfe
SHA512cde376bbceefa1298dbd2b537fd9c603243c736cb16ff2808c54019ead740e84e5ea8a551a78c218a71bb175711cfe22d802c7a34516ca91d41a7174997ce7ac
-
Filesize
6KB
MD56f55e83936dc5cbe4bcef73ccb6adcfa
SHA1126d617f76bc9680182a15da7fdc5b68e7be4a6f
SHA2561be87b718d8092bc65f9ffb10a09e4c45b54786d3b854936b08170611cb7cb0d
SHA5129a8dc075a5de1f87e3da129e14258a7152d3f2d866ae015643586132cc4230a1914d3adb29d67135d1485541928f4766c0aabedaa3d91013ea748108e2f85236
-
Filesize
6KB
MD531e4f39e6de0dcc45dfeb57b494bbe26
SHA12b1990e5c73ad68817bfbeab78d04b0af8b8241c
SHA256febf35857375c8906f2552aaaf1f2c82029c1ee2f36a0c4ed0b5da7c55be8934
SHA512e959ceb7044f25bc9662aeeb142288f7181c8fe5d7bf86d3c5c4e0986d63c05dd44f1fd7a5aa35cf7b53373eb54d3f723019f45e71332196b25db6736fff88fb
-
Filesize
6KB
MD513072db55392243eda485c10887d8c73
SHA10e6fd77f8c8c5c4b17b91b3f186ef2d4eacfa208
SHA256658505011dd0ea7bc8e06bc0bff131a247fc07718e5effc5104c68820187babf
SHA5129a66ab1dafd2ed9fdb0b0c8b2177b89dc4603128f2a742999e75d008c7647189f2ffba0a470a3a96eb0d23ef290c6f6f2ac29d1eed342a2717c95bd98c1fd2ee
-
Filesize
203B
MD5929b46a42e8719e2801f0c7b077659dd
SHA135992bb4fd74ed4ce23b16ec25f88695a622751a
SHA2564f4e622457ce2419b04347eb3465a49a69dbfedce9a25352f82c1a8543f70ca1
SHA5120292306688798cc0a66c060223ed8841143728dce3a45512713c7f9b33968d31de6805650d11196e398600ae26cacfcc629e1975ed206dba864b172031173799
-
Filesize
37B
MD5661760f65468e15dd28c1fd21fb55e6d
SHA1207638003735c9b113b1f47bb043cdcdbf4b0b5f
SHA2560a5f22651f8fe6179e924a10a444b7c394c56e1ed6015d3fc336198252984c0e
SHA5126454c5f69a2d7d7f0df4f066f539561c365bb6b14c466f282a99bf1116b72d757bef0bf03a0e0c68a7538a02a993fc070c52133ca2162c8496017053194f441c
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD59d98b0e68d2e338f497b3941a465e21c
SHA123b28e3fed36d306d64e35141d03a466c1e6a457
SHA2568ded08a254ee56a8aad854c222fbeed297ae08fa766be45d42aa5fd9b8c07636
SHA512d2aa7c1992b265234e2bf900928f0c97ba4b6a8177ed5c316807088d66e6c6f6c30bec766fbd2b0ef5ec70afe5c77992d1afb1d7cbebcc2f510eddd789a4da4d